Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

THE UNIVERSITY OF DODOMA

COLLEGE OF INFORMATICS AND VIRTUAL EDUCATION

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

IA 613 ETHICAL HACKING

STUDENT NAME: MBISE, HERMAN.

STUDENT REGNO#: T22-05-1184

COURSE INSTRUCTOR: PROFESSOR L. MSELE.

NATURE OF WORK: INDIVIDUAL ASSIGNMENT I


ETHICAL LAB SET UP.
Through this lab setup guide, step by step installation and configuration of an ethical lab are
provided.

PREREQUISITES:
In this lab, the following resources will be used:
• Kali Linux distribution as attacking OS.
• Windows 7 as a Practice target (or any other suitable).
• Latest VMware Workstation Pro as a Hypervisor (VMware 17).

PROCEDURES:

❖ Step 1
Install the VMware Workstation Pro Hypervisor to the existing OS, this hypervisor will help to
emulate practice targets as they will be installed on top of the hypervisor. Henceforth, reducing the
expensiveness of having multiple physical workstations as practice targets.
The hypervisor can be downloaded from the VMware official site,
https://www.vmware.com/products/workstation-pro/workstation-pro-evaluation.html of which can
be installed via GUI in windows OS, or in Linux by simply issuing a command to enable execution
of the downloaded file, that is, chmod a+x VMware... before executing the file with the
command ./VMware...

Fig 1: Installed VMware Workstation.


❖ Step 2
On the installed hypervisor, we can now install practice targets, as virtually independent operating
systems. Practice targets can be downloaded from https://www.vulnhub.com, in our case using
VMware as a hypervisor, a VM can be download as a target practice virtual machine archive, that it
can be opened using VMware immediately after extracting the archive.
Alternatively, practice targets can be created as a new virtual machine not only downloaded as
depicted above. In this lab setup guide, a freshly created window 7 virtual machine is used as a target
machine.

Fig 2: Creating a window 7 target machine.

NOTE: Once the two virtual machines are all installed, its paramount to set both machines in the
same network domain, preferably in NAT network configuration.

❖ Step 3

Under “Edit Virtual machine settings” click “Network Adapter” and choose “NAT” radio button.
Fig 3: NAT configuration for the kali VM.

Fig 4: Verifying NAT configuration in IP addresses.


The other VMs can be configured with similar steps.

Fig 5: Verifying NAT configuration in windows VM.

Generally, above steps are the basic general guide on how an ethical lab can be set. We’ve used kali
Linux and Window 7 as attacking machine and victim machine respectively. In most cases OS used
as target or sometimes attacking machines could be of different distributions, versions or variable
vendors of varied architectures. However, the basic steps and fundamental configurations during pen
tests as explained above are preserved.
REFERENCES
https://www.youtube.com/watch?v=bec8boyxp34
https://www.vulnhub.com
https://www.vmware.com/products/workstation-pro/workstation-pro-evaluation.html

You might also like